Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Developing CTFS - Writing and Hosting Intentionally Vulnerable Applications

HackerOne via YouTube

Overview

Learn how to develop and host Capture The Flag (CTF) competitions in this 35-minute talk from HackerOne. Explore the essential infrastructure needed to support large-scale events and discover techniques for creating intentionally vulnerable applications while preventing unintended side effects. Gain insights into CTF scoreboard and backend systems, networked versus static challenges, and the use of Docker containers for web and binary exploitation challenges. Understand the importance of player security, infrastructure protection, and automation in challenge creation. Perfect for cybersecurity enthusiasts and event organizers looking to enhance their CTF hosting skills.

Syllabus

Intro
Overview
What Is a Capture The Flag Competition?
CTF Infrastructure (scoreboard)
CTF Infrastructure (backend)
Networked vs. Static Challenges
Networked Challenges
Docker Container (web challenge)
Docker Container (binary exploitation challenge)
Multiple Challenges (docker-compose)
Never Trust The Player
Infrastructure Security
Pitfalls
Automation (challenges)
Wrapping Up

Taught by

HackerOne

Reviews

Start your review of Developing CTFS - Writing and Hosting Intentionally Vulnerable Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.